Sciweavers

6656 search results - page 1331 / 1332
» Change, Change, Change: Three Approaches
Sort
View
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 10 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
EDBT
2012
ACM
306views Database» more  EDBT 2012»
11 years 10 months ago
Clydesdale: structured data processing on MapReduce
MapReduce has emerged as a promising architecture for large scale data analytics on commodity clusters. The rapid adoption of Hive, a SQL-like data processing language on Hadoop (...
Tim Kaldewey, Eugene J. Shekita, Sandeep Tata
EDBT
2012
ACM
395views Database» more  EDBT 2012»
11 years 10 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...
AAAI
2012
11 years 10 months ago
Discovering Spammers in Social Networks
As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social netwo...
Yin Zhu, Xiao Wang, ErHeng Zhong, Nathan Nan Liu, ...
SOSP
2003
ACM
14 years 4 months ago
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet traffic. This paper probes deeply into modern P2P file sharing systems and the forces that...
P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu...
« Prev « First page 1331 / 1332 Last » Next »